RSMA-Aided Satellite-Aerial-Vehicle Integrated Networks: Secrecy Performance Evaluation with Non-ideal Hardware

Feng Zhou , Xingwang Li , Jian Cheng , Ji Wang and Kefeng Guo

Abstract

Abstract: This work evaluates the secrecy performance for the rate splitting multiple access-aided satellite-aerial-vehicle integrated networks, particularly, non-ideal hardware is further considered at the transmission nodes. To enhance the transmission, rate splitting multiple access scheme is utilized in the considered networks. In addition, multiple unmanned-aerial-vehicles (UAVs) are utilized to help the transmission from the satellite to the vehicle destinations under multiple eavesdroppers. To balance the system performance and complexity, partial selection strategy is applied at the UAVs. Owing to some practical reasons, the direct transmission link is not applied in the considered system. By considering the above the limitations, this paper obtains the exact and asymptotic expressions for the secrecy outage probability to confirm the influences of non-ideal hardware, system parameters and channel parameters on the secrecy performance of the secrecy networks. Moreover, the investigations for the secrecy energy efficiency are also provided in this paper. At last, several representative Monte Carlo simulations are plotted to verify the rightness of the derived results.

Keywords: Non-ideal hardware , rate splitting multiple access , satellite-aerial-vehicle integrated networks , secrecy performance

I. INTRODUCTION

WITH the improvement of the wireless communication systems, higher energy efficiency and higher security have been recognized as the bottomed requirements for the communication systems [1]–[5]. Under these considerations, satellite communication (SatCom) system appears due to its characters, i.e., wide coverage and reliable communication quality [6], [7]. However, owing to several reasons, the satellite sometimes can not transmit the signal to the destination user directly, which requires the assistance of the aerial nodes [8]. The aerial nodes can be moving or fixed by the form of the aerial type, such as high aerial platform (HAP) or unmanned aerial vehicle (UAV) [9]. Relied on this foundations, the satellite-aerial-vehicle integrated network (SAVIN) comes to our sight owing to its own characters, which combines both the advantages of the SatCom and the vehicle communications, thus it has attracted many interests in recent years [10]–[12]. The SAVIN has been confirmed as the hopeful framework for the next generation networks, especially for the sixthgeneration networks [13], [14]. The SAVIN is also recognized the important comment of the real networks, namely, the digital video broadcasting (DVB) systems and the Integrated Space-Ground Information Network Engineering of China [15], [16].

A. Related Works

The research of SAVIN has been a famous issue in recent twenty years owing to the development of the electronic devices. In the first two decade of the 21st century, some researchers have studied this issue. The authors in [17] researched the outage probability (OP) of the SAVINs, besides, the authors got the exact expressions for the OP. In [18], the authors focused on the beamforming problem for the SAVINs. In [19], the symbol error ratio (SER) was investigated for the SAVINs. However, the former papers have derived the closedform expressions by using the some finite series functions, which are hard to follow and to be calculated. At this time, the authors of [20] have simplified the analysis for the SAVINs and obtained the widely used channel model for the satellite transmission link, which is the very popular one being utilized in so many lately works. In [21], the authors utilized this channel model and proposed a max-max scheduling strategy for the SAVINs. In [22], the authors researched the secondary networks performance for the SAVINs under cognitive technology by applying this channel model. The authors of [23] studied the OP for the amplify-and-forward (AF) SAVINs, where multiple users and this popular channel model were both considered.

For some reasons, the transmission networks are not always ideal, they often suffer from non-ideal limitations, such as high non-linearity, phase noise and the other factors, which form the non-ideal hardware (NIH) of the communication nodes [24]–[26]. The authors of [27] researched the influence of NIH on the SatCom systems. The authors of [28] studied the influence of NIH on the SAVINs, especially, the partial relay selection strategy was utilized, moreover, the exact expressions for the OP were further got. In [29], a relay selection strategy was used by setting the proper threshold to gain a balance which means the system can get the acceptable performance by applying proper system complexity, particularly, the detailed investigations for the OP were obtained. In [30], the influence of NIH was investigated for the cognitive SAVIN, especially, the analysis of OP was further obtained. In [31], multiple UAVs were considered for the SAVINs by considering the influence of NIH. In addition, the OP was further researched. In [32], the influences of NIH and simultaneous wireless information and power transfer (SWIPT) on the SAVINs were researched. The authors of [33] studied the influence of NIH nodes on the SAVINs with adaptive relay protocol and cognitive technology, particularly, the system performance was further investigated. In [34], the influence of NIH on the cognitive SAVINs was investigated by considering a direct transmission link. In [35], the impact of NIH on the OP for the SAVINs was further investigated. In [36], the authors investigated the SER for the considered SAVIN by considering the impact of non-orthogonal multiple access (NOMA) and NIH.

As mentioned before, higher security is one basic requirement of the next generation systems, moreover, owing to the inherent factors of the satellite, the SatCom often has a wide coverage, which will lead to the existence of the secrecy issues, especially for the SAVINs. In order to investigate the secrecy issue in theoretical level, physical layer security (PLS) comes to our sight, which can analyze the security problem in theoretical level, besides, it has been regarded to be the hot topic these years [37]–[42]. In [42], the authors concluded all the security issues for the SatCom and proposed the future directions for the secrecy issue of the SatComs. The authors in [43] proposed a user scheduling strategy by applying the opportunistic scheme for the legitimate users and obtained the exact investigations for the secrecy outage probability (SOP), particularly, the probability density function (PDF) for the shadowed-Rician (SR) channel under opportunistic scheduling scheme was first derived. In [44], the influence of NIH was evaluated on the SatCom for the secrecy problems, particularly, the exhaustive investigation for the SOP was further obtained. In [14], the influence of NIH was researched for the SAVINs with several relays, particularly, the two-way technology was applied in it. In [45], the authors researched the SOP for the reconfigurable intelligent surface (RIS)-based the SAVINs, in addition, to enhance the secrecy performance, maximal ratio combining (MRC) scheme was utilized to estimate the secrecy system performance.

Just presented before, another requirement for the next generation is higher energy efficiency, based on this requirement, NOMA is proposed to exhaustive the energy efficiency [46], [47]. The goal of NOMA scheme is to guarantee multiple users simultaneously and allocate the frequency resources by assuming different signals owning different power levels [48]. Through [49], the influence of NIH was studied on the SAVINs with NOMA technique, especially, the exact expression for the SOP was derived along with the asymptotic analysis. In [8], the influences of NIH and NOMA scheme were evaluated for the cognitive SAVINs. In [50], the authors maximized the sum secrecy rate for the NOMA-based cognitive SAVINs. In [51], PLS of a NOMA-aided downlink SAVIN was researched.

B. Motivations

NOMA scheme has its own characters, however, NOMA scheme needs perfect successive interference cancellation (SIC) technology in each legitimate user [52]. To reduce the system complexity, rate-splitting multiple access (RSMA) comes to our sight [53]. When considering the RSMA strategy, every user’s information is separated into two forms, one is common information and the other one is private information. The common information comes from common signals and the private message comes from the private signal. The common signal will be transmitted to all users with SIC technique. The private signals will be forwarded to each corresponding user by taking the other users’ private signals as noise [54]. On this foundation, SIC technique is only utilized once, which will lead to a reduced complexity when compared to the NOMA strategy [55], [56]. On this foundation, RSMA has been regarded as a hopeful multiple access way [57]. RSMA has also been used into the SatCom network. Through [58], the influence of RSMA was researched on the SatCom systems by utilizing the cognitive technique. In [59], the authors studied the OP for the RSMA-based SAVINS in the presence of relay selection strategy. The authors of [60] studied the energy efficiency problem for the RSMA-based SatCom networks, particularly, multiple groups and multiple beams were considered. In [61], the authors investigated the optimization method to get max-min rate fairness for the SAVINs in the presence of RSMA scheme. Some optimization methods have been used to gain a better system performance for the SAVINs [62]–[65]. As the authors realize that only few papers have analyzed the secrecy problem for the RSMA-based SAVINs. In [66], the authors used the optimization method to enlarge the secure transmission rate for the RSMA-based SAVINs along with the cognitive technology. In [67], the authors investigated security and energy problem in the cognitive SAVINs with RSMA. However, from the public reports that there are few open papers or literatures both investigating the influences of NIH and RSMA on the SOP for the SAVINs, which motivates the contributions of this work.

C. Main Works

Inspired from the former descriptions, by both considering the RSMA and NIH into our view, we take a representative SAVIN for the consideration. Particularly, the main contributions are shown as

By both considering the RSMA and NIH into consideration, we give a general secrecy SAVIN model, which comprises a satellite, multiple UAVs, several destinations and several eavesdroppers with non-colluding eavesdropping scheme.

Relied on the secrecy system network, the analysis for the SOP is further derived along with the exact expressions. Through these expressions, the SOP can be evaluated better. Besides, the influence of NIH on the SOP can be even judged.

The asymptotic derivations for the SOP are further investigated along with the simple and efficient expressions in high signal-to-noise ratio (SNR) scenario. Moreover, the secrecy coding gain (SCG) and secrecy diversity order (SDO) are also gotten.

The analysis for the secrecy energy efficiency (SEE) is further investigated for the regarded secrecy networks, especially the comparisons with the NOMA scheme.

Several representative Monte Carlo (MC) simulations are plotted to confirm the efficiency of the theoretical derivations along with some interesting findings and results.

The left parts of this work are shown as: In Section II, the introduction of the secrecy SAVIN model is provided. The exact expressions and asymptotic analysis for SOP are presented along with the SCG and SDO in Section III. Though Section IV, the investigations of SEE are provided to study the energy efficiency. In Section V, several representative MC results are shown to confirm the validity of the former analysis. At last, during Section VI, a summary for the whole work is provided.

Notations: [TeX:] $$E[\cdot]$$ denotes the expected function dedenotes the expected function defined in [68], [TeX:] $$(\cdot)_{\mathrm{x}}$$ represents the Pochhammer symbol [68, page xliii]. [TeX:] $$|\cdot|$$ represents the absolute value [68], [TeX:] $$B(., .)$$ represents the Beta function [68, Eq. 8.384.1].

II. SYSTEM MODEL AND PROBLEM FORMULATION

As plotted in Fig. 1, through the work, we provide a general secrecy SAVIN into account, which comprises one satellite, multiple UAVs [TeX:] $$R_p, p \in\{1, \cdots, P\},$$ multiple legitimate users [TeX:] $$D_j, j \in\{1, \cdots, M\},$$ and multiple potential eavesdroppers [TeX:] $$E_q, q \in\{1, \cdots, L\}$$1. Moreover, each transmission node is assumed to own one antenna2. Moreover, [TeX:] $$R_p$$ works at hallduplex with decode-and-forward (DF) protocol3. The entire transmission needs two time slots. For the first time slot, the S forwards its signal to R, during the second time slot, R retransmits the transmitted signal to the legitimate destinations via DF mode.

1 Besides, during this work, the direct transmission link between the S and [TeX:] $$D_j$$ is not available for the reason that shadowing and blocking.

2 Although in this paper, only one antenna is assumed, our system model and obtained results are also suitable for the case with multiple antenna with a suitable beamforming scheme.

3 In this paper, owing to the long distance of the satellite to the UAV, thus DF protocol is applied at the UAV to enhance the signal transmission.

Fig. 1.
Description of the secrecy system model.

Through the first time slot, RSMA is utilized at S, where the information of each user can be divided into two comments, namely, one is common comment and the other is private comment. The common factors for all users are included in the common information, which are encoded in the common information signal [TeX:] $$s_c(t).$$ On the other hand, the private message for each user will be contained in the private signal [TeX:] $$s_{p,j}(t).$$ Besides, we have the following assumption as [TeX:] $$\overline{R}_{c, j}=\overline{R}_c$$ and [TeX:] $$\overline{R}_{p, j}=\overline{R}_p$$, where [TeX:] $$\bar{R}_{c, j}$$ represents the transmission rate for the common signal for [TeX:] $$D_j.$$ [TeX:] $$\bar{R}_{p, j}$$ represents the target rate of the private signal for [TeX:] $$D_j.$$ It is noted that, the target rate of [TeX:] $$D_j$$ with its form as [TeX:] $$\overline{R}_j=\overline{R}_{c, j}+\overline{R}_{p,j}.$$

The transmitted signal s (t), can be defined as

(1)
[TeX:] $$s(t)=a_c s_c(t)+\sum_{j=1}^M a_j s_{p, j}(t),$$

where [TeX:] $$a_j \text{ and } a_c$$ represent the allocation elements of power for the private signal and the common signal of [TeX:] $$D_j$$, respectively. In addition, [TeX:] $$E\left[|s(t)|^2\right]=E\left[\left|s_c(t)\right|^2\right]=E\left[\left|s_{p, j}(t)\right|^2\right]=1$$ is assumed. Moreover,

(2)
[TeX:] $$a_c^2+\sum_{j=1}^M a_j^2=1.$$

Then, the signal gotten at the pth R is presented as

(3)
[TeX:] $$y_{R_p}(t)=\sqrt{P_S} h_{S R_p}\left[s(t)+\eta_{S R_p}(t)\right]+n_{S R_p}(t),$$

where [TeX:] $$P_S$$ depicts the transmission power of S, [TeX:] $$h_{S R_p}$$ denotes the channel element from S to the pth R with shadowing as SR fading, s (t) represents the transmission signal which has been shown in (1), [TeX:] $$\eta_{S R_p}(t)$$ depicts the distortion noise which comes from the NIH with shadowing as [TeX:] $$\eta_{S R_p}(t) \sim \mathcal{C N}\left(0, \kappa_{S R_p}^2\right), \kappa_{S R_p}$$ is the level of NIH at the pth R. [TeX:] $$n_{S R_p}(t)$$ depicts the additive white Gaussian noise (AWGN) at the pth R with its expression as [TeX:] $$n_{S R_p}(t) \sim \mathcal{C N}\left(0, \delta_{S R_p}^2\right).$$

At the pth R, the common signal [TeX:] $$s_c(t)$$ is decrypted by recognizing the private signals of the legitimate users as interference or noise. By focusing on this consideration, the signal-to-interference-and-noise plus distortion ratio (SINDR) for the pth R by decrypting the common signal [TeX:] $$s_c(t)$$ has the following expression as

(4)
[TeX:] $$\gamma_{R_{p c}}=\frac{a_c^2 \lambda_{S R_p}}{\lambda_{S R_p}\left(\sum_{j=1}^M a_j^2+\kappa_{S R_p}^2\right)+1},$$

where [TeX:] $$\lambda_{S R_p}=\left|h_{S R_p}\right|^2 P_S / \delta_{S R_p}^2.$$

When we decode [TeX:] $$s_c(t)$$ successfully, the decoded [TeX:] $$s_c(t)$$ which SIC is applied will be deleted among the obtained signal. The private signal for [TeX:] $$s_{p . j}(t)$$ is decrypted by regarding the other legitimate users’ private signal as interferences. Relied on this consideration, the SINDR for the pth R by decoding the private signal [TeX:] $$s_{p . j}(t)$$ is obtained as

(5)
[TeX:] $$\gamma_{R_{p p}}=\frac{a_j^2 \lambda_{S R_p}}{\lambda_{S R_p}\left(\sum_{\substack{i=1 \\ i \neq j}}^M a_j^2+\kappa_{S R_p}^2\right)+1}.$$

For the second time slot, the chosen R re-forwards the obtained signal to the legitimate users with the DF mode. Thus, our obtained signal at [TeX:] $$D_j$$ has the following expression as

(6)
[TeX:] $$y_{R_p D_j}(t)=\sqrt{P_R} h_{R_p D_j}\left[s(t)+\eta_{R_p D_j}(t)\right]+n_{D_j}(t),$$

where [TeX:] $$P_R$$ depicts the transmitted power of the selected R, [TeX:] $$h_{R_p D_j}$$ represents the channel factor between the pth R and the jth D with shadowing as the Rayleigh fading. [TeX:] $$\eta_{R_p D_j}(t)$$ denotes the distortion noise following [TeX:] $$\eta_{R_p D_j}(t) \sim \mathcal{C N}\left(0, \kappa_{R_p D_j}^2\right), \kappa_{R_p D_j}$$ is the NIH level at the jth D, [TeX:] $$n_{D_j}(t)$$ depicts the AWGN at the jth D shadowed as [TeX:] $$n_{D_j}(t) \sim \mathcal{C N}\left(0, \delta_{R D_j}^2\right).$$

When applying the same way of [TeX:] $$S \rightarrow R$$ link and (6), the SINDR of the legitimate user [TeX:] $$D_j$$ for decoding [TeX:] $$s_c(t)$$ has the expression as

(7)
[TeX:] $$\gamma_{D_{j c}}=\frac{a_c^2 \lambda_{R_p D_j}}{\lambda_{R_p D_j}\left(\sum_{j=1}^M a_j^2+\kappa_{R_p D_j}^2\right)+1},$$

where [TeX:] $$\lambda_{R_p D_j}=\left|h_{R_p D_j}\right|^2 P_R / \delta_{R_p D_j}^2.$$

When SIC is utilized in the considered system, [TeX:] $$s_c(t)$$ will be removed from the signal received, the SINDR for the legitimate user [TeX:] $$D_j$$ by decoding [TeX:] $$s_{p . j}(t)$$ is written as

(8)
[TeX:] $$\gamma_{D_{j p}}=\frac{a_j^2 \lambda_{R_p D_j}}{\lambda_{R_p D_j}\left(\sum_{\substack{i=1 \\ i \neq j}}^M a_j^2+\kappa_{R_p D_j}^2\right)+1}.$$

As the wider coverage of the UAV and satellite beam, thus the secrecy issue often exists in the SAVIN. Owing to each eavesdropper can steal the legitimate information, the derived signal of the qth eve is derived as

(9)
[TeX:] $$y_{E_q}(t)=\sqrt{P_R} h_{R_p E_q}\left[s(t)+\eta_{R_p E_q}(t)\right]+n_{E_q}(t),$$

where [TeX:] $$h_{R_p E_q}$$ represents the channel coefficient between the pth R and the qth E, [TeX:] $$\eta_{R_p E_q}(t)$$ denotes the distortion noise which follows [TeX:] $$\eta_{R_p E_q}(t) \sim \mathcal{C N}\left(0, \kappa_{R_p E_q}^2\right), \kappa_{R_p E_q}$$ is the NIH level at the qth E, [TeX:] $$n_{E_q}(t)$$ denotes the AWGN at the qth E shadowed as [TeX:] $$n_{E_q}(t) \sim \mathcal{C N}\left(0, \delta_{R_p E_q}^2\right).$$

From (9), the signal-to-noise plus distortion ratio (SNDR) for the qth E is given by

(10)
[TeX:] $$\gamma_{E_q}=\frac{\lambda_{R_p E_q}}{\lambda_{R_p E_q} \kappa_{R_p E_q}^2+1},$$

where [TeX:] $$\lambda_{R_p E_q}=\left|h_{R_p E_q}\right|^2 P_R / \delta_{R_p E_q}^2 .$$

In the former discussion, non-colluding eavesdropping strategy is applied for the secrecy system, then the eventual SNDR of the eavesdropping link has the following expression as

(11)
[TeX:] $$\gamma_E=\max _{q \in\{1, \cdots, L\}}\left(\gamma_{E_q}\right).$$

Secrecy capacity has been investigated in so many former works, in this paper, we used the definition in [14], which uses the discrepancy between the eavesdroppers’ link and the legitimate users’ link. Then, with the assistance of (7), (8), and (11), the secrecy capacity of the whole network is obtained as

(12)
[TeX:] $$C_S=\min _{j \in\{1, \cdots, M\}}\left[C_{B_j}-C_E\right]^{+},$$

where [TeX:] $$C_{B_j}=\log _2\left(1+\gamma_{D_{j c}}+\gamma_{D_{j p}}\right), C_E=\log _2\left(1+\gamma_E\right) \text {, }$$ and [TeX:] $$[x]^{+} \triangleq \max [x, 0].$$

III. SECRECY PERFORMANCE EVALUATION

Through the following parts, the secrecy performance will be researched. At the very beginning, the PDF and cumulative distribution function (CDF) of the considered vehicle transmission channel and satellite transmission channel model are given in the following.

A. Channel Model

1) The vehicle channel model: As mentioned in the former section, the channel model between the UAV and the legitimate users or the eavesdroppers undergoes the Rayleigh fading. Then, the PDF and CDF for [TeX:] $$\lambda_{G G}, G G \in\left\{R_p D_j, R_p E_q\right\}$$ are, respectively, written as

(13)
[TeX:] $$f_{\lambda_{G G}}(x)=\frac{1}{\overline{\lambda}_{G G}} e^{-\frac{x}{\overline{\lambda}_{G G}}},$$

and

(14)
[TeX:] $$F_{\lambda_{G G}}(x)=1-e^{-\frac{x}{\overline{\lambda}_{G G}}},$$

where [TeX:] $$\overline{\lambda}_{G G}$$ represents the average channel gain.

By using [49] and (10), (11), (13), (14), the CDF and PDF for [TeX:] $$\gamma_E$$ are, respectively, written as

(15)
[TeX:] $$F_{\gamma_E}(x)=\left(1-e^{-\frac{x}{\overline{\lambda}_{R_p E_q}\left(1-\kappa_{R_p E_q}^2x\right)}}\right)^L,$$

and

(16)
[TeX:] $$\begin{aligned} f_{\gamma_E}(x)= & \sum_{v=0}^{L-1} \frac{\binom{v-1}{\lambda^2}(-1)^v L}{\overline{\lambda}_{R_p E_q}\left(1-\kappa_{R_p E_q}^2 x\right)^2} \\ & \times \exp \left[-\frac{(v+1) x}{\overline{\lambda}_{R_p E_q}\left(1-\kappa_{R_p E_q}^2 x\right)}\right]. \end{aligned}$$

2) The satellite channel model: Through the considered secrecy system, the geosynchronous earth orbit (GEO) satellite4 is studied. Moreover, multiple transmission beams are considered for the GEO in the presence of time division multiple access (TDMA) scheme [27]. Relied on the consideration, only one UAV is served for transmitting the signal for each time slot. The channel factor [TeX:] $$h_{S R_p}$$ from the UAV to the kth downlink on-board beam of satellite, which is regarded as

(17)
[TeX:] $$h_{S R_p}=C_{S R_p} f_{S R_p},$$

where [TeX:] $$f_{S R_p}$$ denotes the SR factor of the satellite transmission link. [TeX:] $$C_{S R_p}$$ depicts the effects of the free loss (FSL) and antenna pattern with the expression as

(18)
[TeX:] $$C_{S R_p}=\frac{c}{8 \pi^2 f} \sqrt{\frac{G_{S R_p} G_{\mathrm{Re}}}{l^2+l_0^2}},$$

where c represents the velocity of the light, f depicts the frequency of the transmitted wave, l represents the length between the UAV and the on-board beam center of the kth beam. [TeX:] $$l_0 \approx 36000 \mathrm{~km} . G_{S R_p}$$ depicts the antenna gain between the satellite and the UAV. [TeX:] $$G_{R e}$$ represents the on-board kth beam gain of the satellite.

4 We take the GEO satellite for the analysis, however the derived analysis is also utilized to case with medium Earth orbit (MEO) and low Earth orbit (LEO) satellites.

With the help of [14], [TeX:] $$G_{R e}$$ can be derived as

(19)
[TeX:] $$G_{R e}(d B) \simeq \begin{cases}\bar{G}_{\max }, & \text { for } 0^{\circ}\lt\psi\lt1^{\circ} \\ 32-25 \log \log \psi, & \text { for } 1^{\circ}\lt\psi\lt48^{\circ} \\ -10, & \text { for } 48^{\circ}\lt\psi\lt180^{\circ},\end{cases}$$

where [TeX:] $$\bar{G}_{\max }$$ is known as the largest beam gain at the boresight and depicts the angle of the off-boresight. When analyzing the [TeX:] $$G_{R e}$$, from [29], the antenna gain between the satellite and the UAV of the kth beam has the expression as

(20)
[TeX:] $$G_{S R_p} \simeq G_{\mathrm{m}}\left(\frac{K_1\left(\xi_k\right)}{2 \xi_k}+36 \frac{K_3\left(\xi_k\right)}{\xi_k^3}\right),$$

where [TeX:] $$G_m$$ represents the maximal beam gain, [TeX:] $$\xi_k=2.07123 \sin \vartheta_k / \sin \bar{\vartheta}_k, \vartheta_k$$ is the angle between UAV position and the on-board beam center from the kth beam, [TeX:] $$\bar{\vartheta}_k$$ denotes the 3 dB angle for the kth beam. [TeX:] $$K_1 \text{ and } K_3$$ depicts the 1st kind bessel function with order 1 and 3, respectively. [TeX:] $$\vartheta_k$$ is considered to be zero, which leads to the result that [TeX:] $$G_{S R_p} \approx G_m.$$ Relied on the above considerations, we can get [TeX:] $$h_{S R_p}=C_{S R_p}^{\max } f_{S R_p},$$ where

(21)
[TeX:] $$C_{S R_p}^{\max }=\frac{c}{8 \pi^2 f} \sqrt{\frac{G_m G_{\mathrm{Re}}}{l^2+l_0^2}}.$$

By investigating [TeX:] $$f_{S R_p},$$ the authors in [69] proposed a general utilized SR model, which is suitable for the mobile SatCom [14]. From [29], the channel element [TeX:] $$f_{S R_p}$$ has the following form as [TeX:] $$f_{S R_p}=\bar{f}_{S R_p}+\widetilde{f}_{S R_p},$$ where the scattering factor [TeX:] $$\widetilde{f}_{S R_p}$$ is considered to undergo the independent and identically distribution (i.i.d.) Rayleigh fading, while [TeX:] $$\bar{f}_{S R_p}$$ represents the element of line of sight (LoS) factor with undergoing i.i.d. Nakagami-m fading.

On this foundation, the PDF of [TeX:] $$\lambda_{S R_p}=\bar{\lambda}_{S R_p}\left|C_{S R_p}^{\max } f_{S R_p}\right|^2$$ can be written as

(22)
[TeX:] $$f_{\lambda_{S R_p}}(x)=\sum_{k_1=0}^{m_{S R_p}-1} \frac{\alpha_{S R_p}\left(1-m_{S R_p}\right)_{k_1}\left(-\delta_{S R_p}\right)^{k_1} x^{k_1}}{\left(k_{1}!\right)^2 \bar{\lambda}_{S R_p}^{k_1+1} \exp \left(\Delta_{S R_p} x\right)},$$

where [TeX:] $$\overline{\lambda}_{S R_p}$$ is the average SNR between the UAV and the satellite. [TeX:] $$\Delta_{S R_p}=\frac{\beta_{S R_p}-\sigma_{S R_p}}{\overline{\lambda}_{S R_p}},$$ [TeX:] $$\alpha_{S R_p}=\left(\frac{2 b_{S R_p} m_{S R_p}}{2 b_{S R_p} m_{S R_p}+\Omega_{S R_p}}\right)^{m_{S R_p}} / 2 b_{S R_p}$$ [TeX:] $$\delta_{S R_p}=\frac{\Omega_{S R_p}}{\left(2 b_{S R_p} m_{S R_p}+\Omega_{S R_p}\right) 2 b_{S R_p}},$$ [TeX:] $$\beta_{S R_p}=1 / 2 b_{S R_p},$$ where [TeX:] $$m_{S R_p} \geq 0, \Omega_{S R_p} \text { and } 2 b_{S R_p}$$ are the channel elements, which has the meanning as the fading severity parameter, the LoS element’s average power and the multipath’s component’s power. Under this popular assumption, [TeX:] $$m_{S R_p}$$ is regarded to be an integer through this work [22]. Eventually, [TeX:] $$(\cdot)_{k_1}$$ depicts the Pochhammer symbol [68]. When [TeX:] $$m_{S R_p} \rightarrow \infty,$$ the shadowed-Rician channel becomes to the Rician fading.

After applying (22) and utilizing [21], the CDF of [TeX:] $$\lambda_{S R_p}$$ is re-given by

(23)
[TeX:] $$\begin{aligned} & F_{\lambda_{S R_p}}(x) \\ & =1-\sum_{k_1=0}^{m_{S R_p}-1} \sum_{t=0}^{k_1} \frac{\alpha_{S R_p}\left(1-m_{S R_p}\right)_{k_1}\left(-\delta_{S R_p}\right)^{k_1} x^t}{k_{1}!t!\overline{\lambda}_{S R_p}^{k_1+1} \Delta_{S R_p}^{k_1-t+1} \exp \left(\Delta_{S R_p} x\right)}. \end{aligned}$$

B. Secrecy Outage Probability

Through this work, SOP is defined as the probability that the SINDR of either transmission link is smaller than a target threshold, which has the definition as

(24)
[TeX:] $$\begin{aligned} P_{\text {out }}\left(\gamma_0\right) & =1-\left[1-P_1\left(\gamma_0\right)\right]\left[1-P_2\left(\gamma_0\right)\right] \\ & =P_1\left(\gamma_0\right)+P_2\left(\gamma_0\right)-P_1\left(\gamma_0\right) P_2\left(\gamma_0\right) \end{aligned},$$

where [TeX:] $$P_1\left(\gamma_0\right)$$ represents the OP for the [TeX:] $$S \rightarrow R$$ transmission link, [TeX:] $$P_2\left(\gamma_0\right)$$ denotes the SOP for the [TeX:] $$R \rightarrow D$$ transmission link.

Theorem 1. The SOP of the considered system has the following expression as

(25)
[TeX:] $$P_{\text {out }}\left(\gamma_0\right)=\left\{\begin{array}{l} P_{\text {out } 1}\left(\gamma_0\right), \gamma_0 \leq \zeta \\ P_{\text {out } 2}\left(\gamma_0\right), \gamma_0\gt \zeta, \end{array}\right.$$

(26)
[TeX:] $$\begin{aligned} P_{\text {out } 1}\left(\gamma_0\right)= & 1 \\ & -\left\{1-\left[\sum_{k_1=0}^{m_{S R_p}-1} \sum_{t=0}^{k_1} \frac{\left(1-m_{S R_p}\right)_{k_1}\left(-\delta_{S R_p}\right)^{k_1}\left(\frac{\gamma_0}{a_c^2-\gamma_0 A}\right)^t}{\alpha_{S R_p}^{-1} k_{1}!t!\bar{\lambda}_{S R_p}^{k_1+1} \Delta_{S R_p}^{k_1-t+1} \exp \left(\frac{\Delta_{S R_p} \gamma_0}{a_c^2-\gamma_0 A}\right)}\right]\left[\sum_{k_1=0}^{m_{S R_p}-1} \sum_{t=0}^{k_1} \frac{\left(1-m_{S R_p}\right)_{k_1}\left(-\delta_{S R_p}\right)^{k_1}\left(\frac{\gamma_0}{a_j^2-\gamma_0 B}\right)^t}{\alpha_{S R_p}^{-1} k_{1}!t!\bar{\lambda}_{S R_p}^{k_1+1} \Delta_{S R_p}^{k_1-t+1} \exp \left(\frac{\Delta_{S R_p \gamma_0}}{a_j^2-\gamma_0 B}\right)}\right]\right\}^P \\ & +\left\{1-\left[\sum_{k_1=0}^{m_{S R_p}-1} \sum_{t=0}^{k_1} \frac{\left(1-m_{S R_p}\right)_{k_1}\left(-\delta_{S R_p}\right)^{k_1}\left(\frac{\gamma_0}{a_c^2-\gamma_0 A}\right)^t}{\alpha_{S R_p}^{-1} k_{1}!t!\bar{\lambda}_{S R_p}^{k_1+1} \Delta_{S R_p}^{k_1-t+1} \exp \left(\frac{\Delta_{S R_p \gamma_0}}{a_c^2-\gamma_0 A}\right)}\right]\left[\sum_{k_1=0}^{m_{S R_p}-1} \sum_{t=0}^{k_1} \frac{\left(1-m_{S R_p}\right)_{k_1}\left(-\delta_{S R_p}\right)^{k_1}\left(\frac{\gamma_0}{a_j^2-\gamma_0 B}\right)^t}{\alpha_{S R_p}^{-1} k_{1}!t!\bar{\lambda}_{S R_p}^{k_1+1} \Delta_{S R_p}^{k_1-t+1} \exp \left(\frac{\Delta_{S R_p \gamma_0}}{a_j^2-\gamma_0 B}\right)}\right]\right\}^P \\ & \times\left\{1-\left[1-\sum_{v=0}^{L-1} \frac{\left({ }_v^{L-1}\right)(-1)^v L H_1}{2} \sum_{i=1}^U \omega_i g\left(y_i\right)\right]^M\right\} \end{aligned}$$

(28)
[TeX:] $$F_{\gamma_{B_1}}(x)=1-\exp \left\{-\frac{\sqrt{\left[a_c^2+a_j^2-x\left(B_1+A_1\right)\right]^2+4 x\left(a_c^2 B_1+a_j^2 A_1-x A_1 B_1\right)}-\left[\left(a_c^2+a_j^2\right)-x\left(B_1+A_1\right)\right]}{2 \bar{\lambda}_{R_p D_j}\left(a_c^2 B_1+a_j^2 A_1-x A_1 B_1\right)}\right\}$$

(29)
[TeX:] $$F_{\gamma_{B_2}}(x)=1-\exp \left\{-\frac{-\sqrt{\left[a_c^2+a_j^2-x\left(B_1+A_1\right)\right]^2+4 x\left(a_c^2 B_1+a_j^2 A_1-x A_1 B_1\right)}-\left[\left(a_c^2+a_j^2\right)-x\left(B_1+A_1\right)\right]}{2 \bar{\lambda}_{R_p D_j}\left(a_c^2 B_1+a_j^2 A_1-x A_1 B_1\right)}\right\}$$

where [TeX:] $$P_{\text {out } 2}\left(\gamma_0\right)=1$$ and

[TeX:] $$\zeta=\min \left(\frac{a_c^2}{A}, \frac{a_j^2}{B}, \frac{a_c^2}{A_1}, \frac{a_j^2}{B_1}\right),$$

with [TeX:] $$A=1-a_c^2+\kappa_{S R_p}^2, B=\sum_{\substack{i=1 \\ i \neq j}}^M a_j^2+\kappa_{S R_p}^2,$$ [TeX:] $$A_1=1-a_c^2+\kappa_{R_p D_j}^2, \text { and } B_1=\sum_{\substack{i=1 \\ i \neq j}}^M a_j^2+\kappa_{R_p D_j}^2.$$ [TeX:] $$P_{\text {out } 1}\left(\gamma_0\right)$$ is presented as (26), which is found at the top of next page. In (26), [TeX:] $$H_1=\min \left\{\frac{1}{\kappa_{R_p E_q}^2}, \frac{a_c^2 B_1+a_j^2 A_1}{A_1 B_1}\right\}$$ U represents the number of terms, [TeX:] $$y_i=t_i+1$$ is the ith zero of Legendre polynomials, [TeX:] $$\omega_i$$ denotes the Gaussian weight with its derivation in Table (25.4) of [70].

In (26), g (y) has the expression as

(27)
[TeX:] $$\begin{aligned} g(y)= & \frac{\exp \left[-\frac{(v+1) y}{\bar{\lambda}_{R_p E_q}\left(1-\kappa_{R_p E_q}^2 y\right)}\right]}{\left(1-\kappa_{R_p E_q}^2 y\right)^2} \\ & \times\left\{F_{\gamma_{B_1}}\left[y\left(1+\gamma_0\right)+\gamma_0\right]-F_{\gamma_{B_2}}\left[y\left(1+\gamma_0\right)+\gamma_0\right]\right\}, \end{aligned}$$

where [TeX:] $$F_{\gamma_{B_1}}(x) \text { and } F_{\gamma_{B_2}}(x)$$ are written as (28) and (29), shown at the top of next page.

Proof. See Appendix A.

C. Asymptotic SOP

In order to gain the influences of system parameters and channel parameters on the SOP at high SNRs. In this subsection, the asymptotic investigations for SOP in high SNR regime are derived.

In this subsection, we assume that [TeX:] $$\overline{\lambda}_{R_p D_j}=\overline{\lambda}_{S R_p}=\overline{\gamma},$$ when [TeX:] $$\bar{\gamma} \rightarrow \infty \text {, }$$ (14) and (23) are re-written, respectively, as

(30)
[TeX:] $$F_{\lambda_{R_p D_j}}(x)=\frac{x}{\overline{\gamma}}+o(x),$$

and

(31)
[TeX:] $$F_{\lambda_{S R_p}}(x)=\frac{\alpha_{S R_p} x}{\overline{\gamma}}+o(x),$$

where o (x) represents the higher order of x.

Theorem 2. The asymptotic SOP for the system in high SNR regime is given as (32) shown in the middle of next page.

In (32), h (y) is defined as

(33)
[TeX:] $$\begin{aligned} h(y)= & \frac{\exp \left[-\frac{(v+1) y}{\lambda_{P_p E_q}\left(1-\kappa_{P_p E_q}^2 y\right)}\right]}{\left(1-\kappa_{P_p E_q}^2 y\right)^2} \\ & \times\left\{F_{\gamma_{B_3}}\left[y\left(1+\gamma_0\right)+\gamma_0\right]-F_{\gamma_{B_4}}\left[y\left(1+\gamma_0\right)+\gamma_0\right]\right\}, \end{aligned}$$

where [TeX:] $$F_{\gamma_{B_3}}(x) \text { and } F_{\gamma_{B_4}}(x)$$ are written as (34) and (35), which are shown at the 8th page, respectively. In (33), [TeX:] $$U_1$$ represents the number of terms, [TeX:] $$y_\tau=t_\tau+1$$ depicts the th zero of Legendre polynomials, [TeX:] $$\nu_\tau$$ denotes the Gaussian weight with derivations in Table (25.4) of [70].

(32)
[TeX:] $$\begin{aligned} & P_{\text {out } 1}^{\infty}\left(\gamma_0\right) \\ & =1-\left[1-\frac{\alpha_{S R_p}}{\bar{\gamma}}\left(\frac{\gamma_0}{a_c^2-\gamma_0 A}+\frac{\gamma_0}{a_j^2-\gamma_0 B}\right)+\frac{\alpha_{S R_p}^2 \gamma_0^2}{\bar{\gamma}^2\left(a_c^2-\gamma_0 A\right)\left(a_j^2-\gamma_0 B\right)}\right]^P+1-\left[1-\sum_{v=0}^{L-1} \frac{\binom{L-1}{v}(-1)^v L H_1}{2 \bar{\lambda}_{P_p E_q}} \sum_{\tau=1}^{U_1} \nu_\tau h\left(y_\tau\right)\right]^M \end{aligned}$$

(34)
[TeX:] $$F_{\gamma_{B_3}}(x)=1-\frac{\sqrt{\left[a_c^2+a_j^2-x\left(B_1+A_1\right)\right]^2+4 x\left(a_c^2 B_1+a_j^2 A_1-x A_1 B_1\right)}-\left[\left(a_c^2+a_j^2\right)-x\left(B_1+A_1\right)\right]}{2 \bar{\lambda}_{R_p D_j}\left(a_c^2 B_1+a_j^2 A_1-x A_1 B_1\right)}$$

(35)
[TeX:] $$F_{\gamma_{B_4}}(x)=1+\frac{\sqrt{\left[a_c^2+a_j^2-x\left(B_1+A_1\right)\right]^2+4 x\left(a_c^2 B_1+a_j^2 A_1-x A_1 B_1\right)}+\left[\left(a_c^2+a_j^2\right)-x\left(B_1+A_1\right)\right]}{2 \bar{\lambda}_{R_p D_j}\left(a_c^2 B_1+a_j^2 A_1-x A_1 B_1\right)}$$

Proof. By replacing (14) and (23) with (30) and (31), then using the similar way of Theorem 1, (32) will be derived.

The proof is over.

To derive SDO and SCG, (32) has the following form,

(36)
[TeX:] $$P_{\text {out } 1}^{\infty}\left(\gamma_0\right) \approx\left(\frac{S C G}{\bar{\gamma}}\right)^{S D O},$$

where

(37)
[TeX:] $$S D O=1,$$

and the SCG can be derive as

(38)
[TeX:] $$S C G=\alpha_{S R_p}\left(\frac{\gamma_0}{a_c^2-\gamma_0 A}+\frac{\gamma_0}{a_j^2-\gamma_0 B}\right).$$

IV. SECRECY ENERGY EFFICIENCY

For the practical reasons, batteries or the solar panels are the major power forms of the satellite and UAVs. Thus, the SEE is often utilized to verify the efficiency of the secrecy systems. From [8] and [49], the SEE has the following definition as

(39)
[TeX:] $$\psi_{S E E}=\frac{R_{S Y}}{v P_S+P_{\mathrm{int}}},$$

where [TeX:] $$R_{S Y}$$ depicts the secrecy capacity of the transmission systems, v represents the amplifier efficiency of the power. [TeX:] $$P_{int}$$ depicts the cost of the fixed power, such as the circuit power and the other left power. From the former discussions, [TeX:] $$R_{S Y}$$ can be written as [TeX:] $$R_{S Y}=C_{S Y}=\sum_{j=1}^M\left[1-P_{1 p}\left(\gamma_0\right)\right]\left(C_{B_j}-C_E\right),$$ so, (39) can be re-given by

(40)
[TeX:] $$\psi_{S E E}=\frac{\sum_{j=1}^M\left[1-P_{1 p}\left(\gamma_0\right)\right]\left(C_{B_j}-C_E\right)}{v P_S+P_{\mathrm{int}}}.$$

TABLE I
SYSTEM PARAMETERS.
TABLE II
CHANNEL PARAMETERS.

V. NUMERICAL RESULTS

In the following, the theoretical analysis is attested by the MC results. Generally, the GEO satellite is taken as an example5, and [TeX:] $$\delta_{S R_p}^2=\delta_{R_p D_j}^2=\delta_{R_p E_q}^2=1, \bar{\lambda}_{S R_p}=\bar{\lambda}_{R D}=\bar{\gamma}.$$ The system parameters are shown in Table I [28] along with channel parameters shown in Table II [14], respectively. Besides, we set [TeX:] $$\kappa_{S R_p}=\kappa_{R_p D_j}=\kappa_{R_p E_q}=k .$$ Figs. 2–5 use three power allocation Cases. In Case I, [TeX:] $$a c^2=0.79 ;$$ In Case II, [TeX:] $$a c^2=0.82 ;$$ In case III, [TeX:] $$a c^2=0.85$$.

5 The derivations in this works are still suitable for the scene with the other orbit satellite.

Fig. 2 plots the SOP versus different [TeX:] $$\bar{\gamma}$$ with M=3, L=3, [TeX:] $$\bar{\gamma}_E=-5 \mathrm{~dB} \text {, }$$ P=3 and [TeX:] $${\gamma}_0=-4 \mathrm{~dB}$$ in several shadowing scenarios. Fig. 2, it can be seen the MC simulations are tight across the theoretical results through the whole SNRs. Besides, when in high SNR scenarios, the asymptotic derivations are nearly the same with MC results, which indicate the rightness of the theoretical and asymptotic derivations. Next, we can observe that, when the channel is under light fading, the SOP will be lower, which indicates that the SOP is mainly decided by the satellite to UAV link. Moreover, it can be found that when the transmission nodes suffer from heavy impairments, the SOP will be larger, which has been factor of the NIH system [8], [14].

Fig. 2.
SOP versus different [TeX:] $$\bar{\gamma}$$ with M=3, L=3, [TeX:] $$\bar{\gamma}_E=-5 \mathrm{~dB} \text {, }$$ P=3 and [TeX:] $${\gamma}_0=-4 \mathrm{~dB}$$ different shadowing scenarios.

Fig. 3 introduces the SOP versus different [TeX:] $$\bar{\gamma}$$ and different [TeX:] $$\gamma_0$$ with M=3, L=3, [TeX:] $$\bar{\gamma}_E=-5 \mathrm{~dB} \text {, }$$ and P=3 for FHS scenario. From Fig. 3, it can be derived that some same results with Fig. 2, thus, we do not introduce them again to save the space of the paper. Furthermore, when the threshold of the secrecy system grows larger, the SOP will become larger, too, which is the inherent factor of the secrecy system [49], [71].

Fig. 3.
SOP versus different [TeX:] $$\bar{\gamma}$$ and different [TeX:] $$\gamma_0$$ with M=3, L=3, [TeX:] $$\bar{\gamma}_E=-5 \mathrm{~dB} \text {, }$$ and P=3 for FHS scenario.

Fig. 4 plots the SOP versus different [TeX:] $$\bar{\gamma}$$ and different P with M=3, L=3, [TeX:] $$\bar{\gamma}_E=-5 \mathrm{~dB} \text {, }$$ and [TeX:] $${\gamma}_0=-4 \mathrm{~dB}$$ for FHS scenario. Obtained from Fig. 4, when P becomes smaller, the SOP will be higher as a results that less UAVs are utilized for the transmission. However, when we refer to this figure again, we can find that all the curves are parallel, which show that SDO of the considered system is same. From the former analysis, this MC simulations and the theoretical results are the same.

Fig. 4.
SOP versus different [TeX:] $$\bar{\gamma}$$ and different P with M=3, L=3, [TeX:] $$\bar{\gamma}_E=-5 \mathrm{~dB} \text {, }$$ and [TeX:] $${\gamma}_0=-4 \mathrm{~dB}$$ for FHS scenario.

Fig. 5 depicts SOP versus different [TeX:] $$\bar{\gamma}$$ and different [TeX:] $$\bar{\gamma}_E$$ with M=3, L=10, P=3, and [TeX:] $${\gamma}_0=-4 \mathrm{~dB}$$ for FHS scenario. In this figure, we can know that when the power of [TeX:] $$\bar{\gamma}_E$$ become smaller, the SOP will be lower, too,. This is because that the ability of the eavesdropper is powerful, it can overhear much information.

Fig. 5.
SOP versus different [TeX:] $$\bar{\gamma}$$ and different [TeX:] $$\bar{\gamma}_E$$ with M=3, L=10, P=3, and [TeX:] $${\gamma}_0=-4 \mathrm{~dB}$$ for FHS scenario.

Fig. 6 illustrates the SOP versus different [TeX:] $$\bar{\gamma}$$ and different power allocation factors with M=3, L=3, P=3, [TeX:] $$\bar{\gamma}_E=-5 \mathrm{~dB} \text {, }$$ and [TeX:] $${\gamma}_0=-4 \mathrm{~dB}$$ for FHS scenario. Derived in Fig. 5, we can obtain that when the system utilizes the allocation scheme with Case I, the SOP will be lower when compared with Case II. This indicates that we need to allocate much power to the common signal rather than that of private signals.

Fig. 6.
SOP versus different [TeX:] $$\bar{\gamma}$$ and different power allocation factors with M=3, L=3, P=3, [TeX:] $$\bar{\gamma}_E=-5 \mathrm{~dB} \text {, }$$ and [TeX:] $${\gamma}_0=-4 \mathrm{~dB}$$ for FHS scenario.

Fig. 7 examines the SOP versus [TeX:] $$\bar{\gamma}=20 \mathrm{~dB}$$ and different [TeX:] $$\gamma_0$$ with M=3, L=3, and P=3 for FHS and AS scenario. Interestingly, it can be derived that, if the secrecy system suffers from the NIH, the SOP will be always 1 with the threshold increasing to a special value. This value is just the function of the NIH level regardless of the other reasons. A smaller NIH level will lead to a larger value. Besides, when compared with two shadowing scenarios, we can find that the certain constant is the same, which is not decided by the channel fading and the own characters of NIH system.

Fig. 7.
SOP versus different [TeX:] $$\bar{\gamma}$$ and different [TeX:] $${\gamma}_0$$ with M=3, L=3, and P=3 for FHS and AS scenario.

Fig. 8 plots the SOP versus different [TeX:] $$\bar{\gamma}$$ and different selection schemes with M=3, L=3, [TeX:] $$\bar{\gamma}_E=-5 \mathrm{~dB} \text {, and } \gamma_0=-4 \mathrm{~dB}$$ for FHS scenario. It can be found that the secrecy performance of the proposed scheme (partial selection scheme) is superior to that of random selection scheme for the reason that when using partial selection scheme during the simulation results, the best UAV is selected, however, when applying the random selection scheme, one random UAV is chosen. Obviously, the performance of random selection is worse than that of partial selection scheme. Moreover, it is interesting that when the system undergoes light NIH, the SOP will be lower, which is the inherent character of the NIH systems [8], [49].

From Fig. 2 to Fig. 8, it can be obtained that the channel fading, the NIH level, the threshold, the [TeX:] $$\bar{\gamma}_E$$, the number of UAVs, the number of eavesdroppers and selection scheme have serious impacts on the SOP of the considered secrecy system.

Fig. 8.
SOP versus different [TeX:] $$\bar{\gamma}$$ and different selection schemes with M=3, L=3, [TeX:] $$\bar{\gamma}_E=-5 \mathrm{~dB} \text {, and } \gamma_0=-4 \mathrm{~dB}$$ for FHS scenario.

Figs. 9–11 illustrate the SEE for the system withM=2, L=2, [TeX:] $$\bar{\gamma}_E=-5 \mathrm{~dB} \text {, and } \gamma_0=-4 \mathrm{~dB}$$ From [72], [TeX:] $$v=2 \text { and } P_{\text {int }}=5 \mathrm{~dBW}$$ are considered for the whole system. Derived by Fig. 9, we can find that much power is allocated to the common message, the SEE will be larger. Obtained from Fig. 10, when the network is suffering from heavy channel fading, the SEE will be lower. However, the satellite shadowing has little influence on the SEE according to the MC simulation results. It maybe come from that the UAV uses the DF protocol to enhance the secrecy performance. From Fig. 11, we can find that the SEE of RSMA is superior to that of NOMA scheme, which is the advantage of the RSMA scheme. It is interesting that all the curves in these three figures, all the SEEs have an extreme point. When the [TeX:] $$\bar{\gamma}$$ is larger than this point, the SEE will be lower as the [TeX:] $$\bar{\gamma}$$ becomes larger. Interestingly, we find that when [TeX:] $$\bar{\gamma}$$ is smaller than this point, the SEE will be larger as [TeX:] $$\bar{\gamma}$$ becoming larger.

Fig. 9.
SEE versus different [TeX:] $$\bar{\gamma}$$ and two selection scheme with M=3, L=2, [TeX:] $$\bar{\gamma}_E=-5 \mathrm{~dB} \text {, and } \gamma_0=-4 \mathrm{~dB}$$ for ILS scenario.
Fig. 10.
SEE versus different [TeX:] $$\bar{\gamma}$$ and different shadowing scenarios with M=3, L=2, [TeX:] $$\bar{\gamma}_E=-5 \mathrm{~dB} \text {, and } \gamma_0=-4 \mathrm{~dB}$$.
Fig. 11.
SEE versus different [TeX:] $$\bar{\gamma}$$ and two multiple access cases with M=3, L=2, [TeX:] $$\bar{\gamma}_E=-5 \mathrm{~dB} \text {, and } \gamma_0=-4 \mathrm{~dB}$$ for FHS scenario.

VI. CONCLUSIONS

This paper researched the secrecy performance for the RSMA-based SAVINs with the existence of the NIH and multiple eavesdroppers. When considering the secrecy networks, the entire expressions for the SOP were further derived. In addition, the MC simulations were obtained to confirm the the correctness of the theoretical analysis. The results indicated that less P, the heavy channel fading, much eavesdropping power, larger NIH level and larger secrecy threshold would lead to a worse system performance. Besides, the simulation results for the SEE were also provided. Interestingly, we found that there existed a turning value for the SEE. Finally, much power was allocated to the common signal would bring a more secrecy system.

APPENDIX A

PROOF OF LEMMA 1

From (24), it can be found that the important thing to get the derivations for [TeX:] $$P_1\left(\gamma_0\right) \text { and } P_2\left(\gamma_0\right).$$ In what follows, the exact expressions for them will be gotten.

Firstly, the detailed process for obtaining [TeX:] $$P_1\left(\gamma_0\right)$$ will be provided. By utilizing the partial selection scheme, the OP for the [TeX:] $$S \rightarrow R$$ link, i.e., [TeX:] $$P_1\left(\gamma_0\right)$$ can be written as

(41)
[TeX:] $$P_1\left(\gamma_0\right)=1-\left[1-P_{1 p}\left(\gamma_0\right)\right]^P \text {, }$$

where

(42)
[TeX:] $$\begin{aligned} P_{1 p}\left(\gamma_0\right) & =1-\left[1-P_{1 p c}\left(\gamma_0\right)\right]\left[1-P_{1 p p}\left(\gamma_0\right)\right] \\ & =P_{1 p c}\left(\gamma_0\right)+P_{1 p p}\left(\gamma_0\right)-P_{1 p c}\left(\gamma_0\right) P_{1 p p}\left(\gamma_0\right), \end{aligned}$$

where [TeX:] $$P_{1 p c}\left(\gamma_0\right)$$ denotes the OP for the pth R by decoding the common message and [TeX:] $$P_{1 p p}\left(\gamma_0\right)$$ represents the OP for the pth R by decoding the private message.

By utilizing (23) and (4), [TeX:] $$P_{1 p c}\left(\gamma_0\right)$$ is derived as

(43)
[TeX:] $$\begin{aligned} P_{1 p c}\left(\gamma_0\right) & =\operatorname{Pr}\left(\gamma_{R_{p c}} \leq \gamma_0\right) \\ & =\operatorname{Pr}\left(\frac{a_c^2 \lambda_{S R_p}}{\lambda_{S R_p} A+1} \leq \gamma_0\right)=\operatorname{Pr}\left(\lambda_{S R_p} \leq \frac{\gamma_0}{a_c^2-\gamma_0 A}\right) \\ & =1-\sum_{k_1=0}^{m_{S R_p}-1} \sum_{t=0}^{k_1} \frac{\left(1-m_{S R_p}\right)_{k_1}\left(-\delta_{S R_p}\right)^{k_1}\left(\frac{\gamma_0}{a_c^2-\gamma_0 A}\right)^t}{\alpha_{S R_p}^{-1} k_{1}!t!\bar{\lambda}_{S R_p}^{k_1+1} \Delta_{S R_p}^{k_1 t+1} \exp \left(\frac{\Delta_{S R_p} \gamma_0}{a_c^2-\gamma_0 A}\right)}. \end{aligned}$$

With the same way of deriving [TeX:] $$P_{1 p c}\left(\gamma_0\right)$$, the closed expression for [TeX:] $$P_{1 p p}\left(\gamma_0\right)$$ is given by

(44)
[TeX:] $$\begin{aligned} & P_{1 p p}\left(\gamma_0\right) \\ & =1-\sum_{k_1=0}^{m_{S R_p}-1} \sum_{t=0}^{k_1} \frac{\left(1-m_{S R_p}\right)_{k_1}\left(-\delta_{S R_p}\right)^{k_1}\left(\frac{\gamma_0}{a_j^2-\gamma_0 B}\right)^t}{\alpha_{S R_p}^{-1} k_{1}!t!\bar{\lambda}_{S R_p}^{k_1+1} \Delta_{S R_p}^{k_1-t+1} \exp \left(\frac{\Delta_{S R_p} \gamma_0}{a_j^2-\gamma_0 B}\right)}. \end{aligned}$$

Next, after inserting (43) and (44) into (42), [TeX:] $$P_{1 p}\left(\gamma_0\right)$$ will be derived. After inserting the expression of [TeX:] $$P_{1 p}\left(\gamma_0\right)$$ into (41), the closed-form expression for [TeX:] $$P_{1 p}\left(\gamma_0\right)$$ will be got.

The second thing is to get the closed-form expression for [TeX:] $$P_2\left(\gamma_0\right)$$.

From (12), [TeX:] $$P_2\left(\gamma_0\right)$$ can be written as

(45)
[TeX:] $$\begin{aligned} P_2\left(\gamma_0\right) & =\operatorname{Pr}\left(\min _{j \in\{1, \cdots, M\}}\left[C_{B_j}-C_E\right]^{+} \leq C_0\right) \\ & =1-[1-\underbrace{\operatorname{Pr}\left(C_{B_j}-C_E \leq C_0\right)}_{J_1}]^M, \end{aligned}$$

where [TeX:] $$C_0=\log _2\left(1+\gamma_0\right).$$

In (45), [TeX:] $$J_1$$ is the important one which requires to be obtained. [TeX:] $$J_1$$ can be written as

(46)
[TeX:] $$\begin{aligned} J_1 & =\operatorname{Pr}\left(C_{B_j} \leq C_0+C_E\right) \\ & =\operatorname{Pr}\left[\log _2\left(1+\gamma_{D_{j c}}+\gamma_{D_{j p}}\right) \leq \log _2\left(1+\gamma_0\right)+\log _2\left(1+\gamma_E\right)\right] \\ & =\operatorname{Pr}\left[\gamma_{D_{j c}}+\gamma_{D_{j p}} \leq \gamma_0+\gamma_E\left(1+\gamma_0\right)\right] \\ & =\int_0^{\infty} F_{\gamma_{D_{j c}}+\gamma_{D_{j p}}}\left[\gamma_0+y\left(1+\gamma_0\right)\right] f_{\gamma_E}(y) d y. \end{aligned}$$

In (46), it is important to get the CDF of [TeX:] $$F_{\gamma_{D_{j c}}+\gamma_{D_{j p}}}(x),$$ from (7) and (8), [TeX:] $$F_{\gamma_{D_{j c}}+\gamma_{D_{j p}}}(x)$$ can be re-given by

(47)
[TeX:] $$\begin{aligned} F_{\gamma_{D_{j c}}+\gamma_{D_{j p}}}(x) & =\operatorname{Pr}\left(\frac{a_c^2 \lambda_{R_p D_j}}{\lambda_{R_p D_j} A_1+1}+\frac{a_j^2 \lambda_{R_p D_j}}{\lambda_{R_p D_j} B_1+1} \leq x\right) \\ & =\operatorname{Pr}\left(D \lambda_{R_p D_j}^2+E \lambda_{R_p D_j}-x \leq 0\right) \\ & =\operatorname{Pr}\left[\left(\lambda_{R_p D_j}-x_1\right)\left(\lambda_{R_p D_j}-x_2\right) \leq 0\right] \\ & =\operatorname{Pr}\left(x_2 \leq \lambda_{R_p D_j} \leq x_1\right) \\ & =\operatorname{Pr}\left(\lambda_{R_p D_j} \leq x_1\right)-\operatorname{Pr}\left(\lambda_{R_p D_j} \leq x_2\right) \\ & =F_{\gamma_{B_1}}(x)-F_{\gamma_{B_2}}(x) \end{aligned}$$

where [TeX:] $$x_2=\frac{-E-\sqrt{E^2+4 D x}}{2 D}, x_1=\frac{-E+\sqrt{E^2+4 D x}}{2 D},$$ [TeX:] $$D=a_c^2 B_1+a_j^2 A_1-x A_1 B_1 \text { and } E=a_c^2+a_j^2-x\left(A_1+B_1\right) \text {. }$$

Then, by using (14), (28) and (29) could be obtained.

Then, by submitting (47) and (16) into (46), (46) can be re-derived as

(48)
[TeX:] $$\begin{aligned} J_1= & \int_0^{\infty}\left\{F_{\gamma_{B_1}}\left[\gamma_0+y\left(1+\gamma_0\right)\right]-F_{\gamma_{B_2}}\left[\gamma_0+y\left(1+\gamma_0\right)\right]\right\} \\ & \times \sum_{v=0}^{L-1} \frac{\binom{L-1}{v}(-1)^v L}{\bar{\lambda}_{R_p E_q}\left(1-\kappa_{R_p E_q}^2 y\right)^2} \exp \left[-\frac{(v+1) y}{\bar{\lambda}_{R_p E_q}\left(1-\kappa_{R_p E_q}^2 y\right)}\right] d y. \end{aligned}$$

However, trying the author’s best knowledge, (48) can not be derived in regular method. In addition, with the assistance of [70] and utilizing the Gaussian-Chebyshev quadrature, [TeX:] $$J_1$$ has the following expression as

(49)
[TeX:] $$J_1=\sum_{v=0}^{L-1} \frac{\binom{L-1}{v}(-1)^v L H_1}{2 \bar{\lambda}_{R_p E_q}} \sum_{i=1}^U \omega_i g\left(y_i\right).$$

In addition, by inserting (49) into (45), the expression for [TeX:] $$P_2\left(\gamma_0\right)$$ can be obtained.

Finally, by inserting [TeX:] $$P_1\left(\gamma_0\right) \text { and } P_2\left(\gamma_0\right)$$ into (24), after some calculating steps, the SOP can be obtained.

Proof is finished.

Biography

Feng Zhou

Feng Zhou received the B.S. degrees and M.S. degrees from Southeast University, Nanjing, China, in 2004 and 2012 respectively. Since 2017, he has been an Associate Professor with the College of Information Engineering, Yancheng Institute of Technology, Yancheng, China. His research interests include cooperative communication, satellite communication, cognitive radio, physical layer security and UAV communication.

Biography

Xingwang Li

Xingwang Li (IEEE Senior Member) received his M. Sc. and Ph. D. degrees from University of Electronic Science and Technology of China and Beijing University of Posts and Telecommunications in 2010 and 2015. From 2010 to 2012, he was working with Comba Telecom Ltd. in Guangzhou China, as an Engineer. He spent one year from 2017 to 2018 as a Visiting Scholar at Queen’s University Belfast, Belfast, UK. He is currently an Associated Professor with the School of Physics and Electronic Information Engineering, Henan Polytechnic University, Jiaozuo China. His research interests span wireless communication, intelligent transport system, artificial intelligence, and Internet of things. He was a Recipient of exemplary Reviewer for IEEE Transactions on Communications (2022), IEEE Communications Letters (2023) and Journal of Electronics Information Technology (2022). He is on the editorial board of IEEE Transactions on Intelligent Transportation Systems, IEEE Transactions on Vehicular Technology, IEEE Communications Letters, IEEE Systems Journal, IEEE Sensors Journal, Physical Communication, etc. He has serviced as the Guest Editor for the special issue on Integrated Sensing and Communications (ISAC) for 6G IoE of IEEE Internet of Things Journal, Computational Intelligence and Advanced Learning for Next-Generation Industrial IoT of IEEE Transactions on Network Science and Engineering, "AI driven Internet of Medical Things for Smart Healthcare Applications: Challenges, and Future Trends" of the IEEE Journal of Biomedical and Health Informatics, etc. He has served as many TPC members, such as IEEE ICC, GLOBECOM, etc.

Biography

Jian Cheng

Jian Cheng received the Ph.D. degree from the PLA University of Science and Technology, Nanjing, China, in 2008. He is currently a Professor with College of Electronic and Information Engineering, Nanjing University of Aeronautics and Astronautics, Nanjing. His research interests include satellite communications, integrated satellite terrestrial networks, satellite TTC, and satellite covert communication.

Biography

Ji Wang

Ji Wang received the B.S. degree from the School of Electronic Information and Communications, Huazhong University of Science and Technology, China, in 2008, and the Ph.D. degree from the School of Information and Communications Engineering, Beijing University of Posts and Telecommunications, China, in 2013. He is currently an Associate Professor with the Department of Electronics and Information Engineering, College of Physical Science and Technology, Central China Normal University, China. Prior to that, he held Postdoctoral positions with the School of Electronic Information and Communications, Huazhong University of Science and Technology, and the Department of Electrical Engineering, Columbia University, USA. His research interests include 5G/6G networks and machine learning.

Biography

Kefeng Guo

Kefeng Guo received his B.S. degree from Beijing Institute of Technology, Beijing, China in 2012, and the Ph.D. degree in Army Engineering University, Nanjing, China in 2018. He is a Lecturer in School of Space Information, Space Engineering University. He is also an Associate Professor in the College of Electronic and Information Engineering, Nanjing University of Aeronautics and Astronautics. He has authored or coauthored nearly 100 research papers in international journals and conferences. His re- search interests focus on cooperative relay networks, MIMO communications systems, multiuser communication systems, satellite communication, hardware impairments, cognitive radio, NOMA technology, and physical layer security. He was a Recipient of Exemplary Reviewer for IEEE Transactions on Communications in 2022. He was the Recipient of the Outstanding Ph.D. Thesis Award of Chinese Institute of Command and Control in 2020. He also was the Recipient of the Excellent Ph.D. Thesis Award of Jiangsu Province, China in 2020. He was the Recipient of the Best Paper Award of WiSATS 2024. He was listed in the World’s Top 2% Scientists identified by Stanford University in 2022-2024. He also serves as an Editor on the Editorial Board for the EURASIP Journal on Wireless Communications and Networking and IEEE Open Journal of the Communications Society. Dr. Guo has been the TPC Member of many IEEE sponsored conferences, such as IEEE ICC, IEEE GLOBECOM and IEEE WCNC.

References

  • 1 O. Kodheli et al., "Satellite communications in the new space era: A survey and future challenges," IEEE Commun. Surveys Tut., vol. 23, no. 1, pp. 70-109, Firstquarter, 2021.doi:[[[10.1109/COMST.2020.3028247]]]
  • 2 R. Liu et al., "RIS-empowered satellite-aerial-terrestrial networks with PD-NOMA," IEEE Commun. Surveys Tut., early access. doi: 10.1109/COMST.2024.3393612.doi:[[[10.1109/COMST.2024.3393612]]]
  • 3 M. Fiore, "Full network sensing: Architecting 6G beyond communications," IEEE Netw., vol. 37, no. 3, pp. 232-239, May/Jun. 2023.doi:[[[10.1109/MNET.001.2200491]]]
  • 4 Z. Zhu et al., "Intelligent reflecting surface-assisted wireless powered heterogeneous networks," IEEE Trans. Wireless Commun., vol. 22, no. 12, pp. 9881-9892, Dec. 2023.doi:[[[10.1109/TWC.2023.3274220]]]
  • 5 Z. Zhu et al., "Resource allocation for intelligent reflecting surface assisted wireless powered IoT systems with power splitting," IEEE Trans. Wireless Commun., vol. 21, no. 5, pp. 2987-2998, May 2022.doi:[[[10.1109/TWC.2021.3117346]]]
  • 6 K. Guo et al., "Ergodic capacity of NOMA-based overlay cognitive integrated satellite-UAV-Terrestrial networks," Chinese J. Electron., vol. 32, no. 1, pp. 273-282, Feb. 2023.doi:[[[10.23919/cje.2021.00.316]]]
  • 7 C. Wang et al., "Metaverse-inspired cybertwin-based space-air-ground integrated networks," IEEE Netw., vol. 37, no. 2, pp. 294-300, Mar./Apr. 2023.doi:[[[10.1109/MNET.003.2200519]]]
  • 8 K. Guo et al., "NOMA-based cognitive satellite terrestrial relay network: Secrecy performance under channel estimation errors and hardware impairments," IEEE Internet Things J., vol. 9, no. 18, pp. 17334-17347, Sep. 2022.doi:[[[10.1109/JIOT.2022.3157673]]]
  • 9 H. Dahrouj et al., "Machine leanning-based user scheduling in integrated satellite-HAPS-ground networks," IEEE Netw., vol. 37, no. 2, pp. 102-109, Mar./Apr. 2023.doi:[[[10.48550/arXiv.2205.13958]]]
  • 10 J. Xu et al., "Space-air-ground-sea integrated networks: Modeling and coverage analysis," IEEE Trans. Wireless Commun., vol. 22, no. 9, pp. 6298-6313, Sep. 2023.doi:[[[10.1109/TWC.2023.3241341]]]
  • 11 K. Guo et al., "Deep reinforcement learning and NOMA-based multiobjective RIS-assisted IS-UAV-TNs: Trajectory optimization and beamforming design," IEEE Trans. Intelligent Transp. Syst., vol. 24, no. 9, pp. 10197-10210, Sep. 2023.doi:[[[10.1109/TITS.2023.3267607]]]
  • 12 L. Qu et al., "UAV-assisted RF/FSO relay system for space-air-ground integrated network: A performance analysis," IEEE Trans. Wireless Commun., vol. 21, no. 8, pp. 6211-6225, 2022.doi:[[[10.1109/TWC.2022.3147823]]]
  • 13 D. Li et al., "CWGAN-based channel modeling of convolutional autoencoder-aided SCMA for satellite-terrestrial communication," IEEE Internet Things J., early access. doi: 10.1109/JIOT.2024.3425470.doi:[[[10.1109/JIOT.2024.3425470]]]
  • 14 K. Guo et al., "Integrated satellite multiple two-way relay networks: Secrecy performance under multiple eves and vehicles with non-ideal hardware," IEEE Trans. Intel. Veh., vol. 8, no. 2, pp. 1307-1318, Feb. 2023.doi:[[[10.1109/TIV.2022.3215011]]]
  • 15 ETSI TS 102 585 V1.1.2, "Digital Video Broadcasting (DVB); System specifications for Satellite services to Handheld devices (SH) below 3 GHz," Apr. 2008.custom:[[[https://www.etsi.org/deliver/etsi_ts/102500_102599/102585/01.01.02_60/ts_102585v010102p.pdf]]]
  • 16 M. Lin et al., "Integrated 5G-satellite networks: A perspective on physical layer relibility and security," IEEE Wireless Commun., vol. 27, no. 6, pp. 152-159, Dec. 2020.doi:[[[10.1109/MWC.001.2000143]]]
  • 17 M. R. Bhatnagar et al., "On the closed-form performance analysis of maximal ratio combining in shadowed-rician fading LMS channels," IEEE Commun. Lett., vol. 18, no. 1, pp. 54-57, Jan. 2014.doi:[[[10.1109/LCOMM.2013.111313.131963]]]
  • 18 M. K. Arti et al., "Beamforming and combining in hybrid satelliteterrestrial cooperative systems," IEEE Commun. Lett., vol. 18, no. 3, pp. 483-486, Mar. 2014.doi:[[[10.1109/LCOMM.2014.012214.132738]]]
  • 19 K. An et al., "Symbol error analysis of hybrid satellite-terrestrial cooperative networks with cochannel interference," IEEE Commun. Lett., vol. 18, no. 11, pp. 1947-1950, Nov. 2014.doi:[[[10.1109/LCOMM.2014.2361517]]]
  • 20 N. I. Miridakis et al., "Dual-hop communication over a satellite relay and shadowed rician channels," IEEE Trans. Veh. Technol., vol. 64, no. 9, pp. 4031-4040, Sep. 2015.doi:[[[10.1109/TVT.2014.2361832]]]
  • 21 P. K. Upadhyay and P. K. Sharma, "Max-max user-relay selection scheme in multiuser and multirelay hybrid satellite-terrestrial relay systems," IEEE Commun. Lett., vol. 20, no. 2, pp. 268-271, Jan. 2016.doi:[[[10.1109/LCOMM.2015.2502599]]]
  • 22 P. K. Sharma, P. K. Upadhyay, D. B. da Costa, P. S. Bithas, and A. G. Kanatas, "Performance analysis of overlay spectrum sharing in hybrid satellite-terrestrial systems with secondary network selection," IEEE Trans. Wireless Commun., vol. 16, no. 10, pp. 6586-6601, Oct. 2017.doi:[[[10.1109/TWC.2017.2725950]]]
  • 23 K. An et al., "On the performance of multiuser hybrid satellite-terrestrial relay networks with opportunistic scheduling," IEEE Commun. Lett., vol. 19, no. 10, pp. 1722-1725, Oct. 2015.doi:[[[10.1109/LCOMM.2015.2466535]]]
  • 24 E. Costa and S. Pupolin, "M-QAM-OFDM system performance in the presence of a nonlinear amplifier and phase noise," IEEE Trans. Commun., vol. 50, no. 3, pp. 462-472, Mar. 2002.doi:[[[10.1109/26.990908]]]
  • 25 T. Schenk, RF imperfections in high-rate wireless systems: Impact and digital compensation, Springer, Netherlands, 2008, pp. 2033-2043.custom:[[[https://link.springer.com/book/10.1007/978-1-4020-6903-1]]]
  • 26 C. Studer, M. Wenk, and A. Burg, "MIMO transmission with residual transmit-RF impairments," in Proc. WSA, 2010.doi:[[[10.1109/WSA.2010.5456453]]]
  • 27 K. Guo et al., "On the performance of LMS communication with hardware impairments and interference," IEEE Trans. Commun., vol. 67, no. 2, pp. 1490-1505, Feb. 2019.doi:[[[10.1109/TCOMM.2018.2878848]]]
  • 28 K. Guo et al., "On the performance of the uplink satellite multi-terrestrial relay networks with hardware impairments and interference," IEEE Syst. J., vol. 13, no. 3, pp. 2297-2308, Sep. 2019.doi:[[[10.1109/JSYST.2019.2901800]]]
  • 29 K. Guo et al., "Performance analysis of hybrid satellite-terrestrial cooperative networks with relay selection," IEEE Trans. Veh. Technol., vol. 69, no. 8, pp. 9053-9067, Aug. 2020.doi:[[[10.1109/TVT.2020.2999752]]]
  • 30 K. Guo, K. An, B. Zhang, Y . Huang, and G. Zheng, "Outage analysis of cognitive hybrid satellite-terrestrial networks with hardware impairments and multi-primary users," IEEE Wireless Commun. Lett., vol. 7, no. 5, pp. 816-819. Oct. 2018.doi:[[[10.1109/LWC.2018.2827067]]]
  • 31 P. K. Sharma et al., "Outage performance of multi-UAV relaying-based imperfect hardware hybrid satellite-terrestrial networks," IEEE Syst. J., vol. 16, no. 2, pp. 2311-2314, Jun. 2022.doi:[[[10.1109/JSYST.2021.3090799]]]
  • 32 J. Zhao et al., "Performance analysis of SWIPT-NOMA assisted satellite-terrestrial system with hardware impairments and imperfect CSI," in Proc. IEEE APCC, 2021.doi:[[[10.1109/APCC49754.2021.9609839]]]
  • 33 V . Singh et al., "Performance analysis of hardware-impaired overlay cognitive satellite-terrestrial networks with adaptive relaying protocol," IEEE Syst. J., vol. 15, no. 1, pp. 192-203, Mar. 2021.doi:[[[10.1109/JSYST.2020.2967836]]]
  • 34 V . Singh et al., "Impact of hardware impairments on cognitive satelliteterrestrial relaying with a direct link," in Proc. IEEE CNCC, 2020.doi:[[[10.1109/CCNC46108.2020.9045578]]]
  • 35 H. Wu et al., "Impact of hardware impairments on outage performance of hybrid satellite-terrestrial relay systems," IEEE Access, vol. 7, pp. 35103-35112, Mar. 2019.doi:[[[10.1109/ACCESS.2019.2905129]]]
  • 36 G. Xu et al., "Symbol error analysis for integrated satellite-terrestrial relay networks with non-orthogonal multiple access under hardware impairments," IEEE Trans. Wireless Commun., early access. doi: 10.1109/TWC.2024.3397847.doi:[[[10.1109/TWC.2024.3397847]]]
  • 37 Z. Lin, M. Lin, J.-B. Wang, T. de. Cola, and J. Wang, "Joint beamforming and power allocation for satellite-terrestrial integrated networks with non-orthogonal multile access," IEEE J. Sel. Topic S. Proc., vol. 13, no. 3, pp. 657-670, Jun. 2019.doi:[[[10.1109/JSTSP.2019.2899731]]]
  • 38 Z. Lin et al., "Secrecy-energy efficient hybrid beamforming for satelliteterrestrial integrated networks," IEEE Trans. Commun., vol. 69, no. 3, pp. 6345-6360, 2021.doi:[[[10.1109/TCOMM.2021.3088898]]]
  • 39 Z. Zhu et al., "AI-enabled STAR-RIS aided MISO ISAC Secure Communications," arXiv:2402.16413.doi:[[[10.48550/arXiv.2402.16413]]]
  • 40 Z. Xu et al., "Sum secrecy rate maximization for IRS-aided multi-cluster MIMO-NOMA terahertz systems," IEEE Trans. Inf. Forensics Security, vol. 18, pp. 4463-4474, Jul. 2023.doi:[[[10.1109/TIFS.2023.3293957]]]
  • 41 X. Li et al., "Secure communication of active RIS assisted NOMA networks," IEEE Trans. Wireless Commun., vol. 23, no. 5, pp. 4489-4503, May 2024.doi:[[[10.48550/arXiv.2403.11109]]]
  • 42 B. Li, Z. Fei, C. Zhou, and Y . Zhang, "Physical layer security in space information networks: A survey," IEEE Internet Things J., vol. 7, no. 1, pp. 33-52, Jan. 2020.doi:[[[10.1109/JIOT.2019.2943900]]]
  • 43 K. Guo et al., "Secrecy performance of satellite wiretap channels with multi-user opportunistic scheduling," IEEE Wireless Commun. Lett., vol. 7, no. 6, pp. 1054-1057, Dec. 2018.doi:[[[10.1109/LWC.2018.2859385]]]
  • 44 F. Zhou et al., "Secrecy outage analysis of satellite communication networks with hardware impairments and channel estimation errors," Electronics Lett., vol. 56, no. 20, pp. 1059-1062, Sep. 2020.doi:[[[10.1049/el.2020.1814]]]
  • 45 F. Zhou et al., "Secrecy performance for RIS-based integrated satellite vehicle networks with a UAV relay and MRC eavesdropping," IEEE Trans. Intel. Veh., vol. 8, no. 2, pp. 1676-1685, Feb. 2023.doi:[[[10.1109/TIV.2022.3225466]]]
  • 46 X. Yue and Y . Liu, "Performance analysis of intelligent reflecting surface assisted NOMA networks," IEEE Trans. Wireless Commun., vol. 21, no. 4, pp. 2623-2636, Apr. 2022.doi:[[[10.1109/TWC.2021.3114221]]]
  • 47 Q. Wang et al., "UAV-enabled non-orthogonal multiple access networks for ground-air-ground communications," IEEE Trans. Green Commun. Netw., vol. 6, no. 3, pp. 1340-1354, Sep. 2022.doi:[[[10.1109/TGCN.2022.3152601]]]
  • 48 L. Lv, J. Chen, and Q. Ni, "Cooperative non-orthogonal multiple access in cognitive radio," IEEE Comm. Lett., vol. 20, no. 10, pp. 2059-2062, Oct. 2016.doi:[[[10.1109/LCOMM.2016.2596763]]]
  • 49 K. Guo et al., "On the secrecy performance of NOMA-based integrated satellite multiple-terrestrial relay networks with hardware impairments," IEEE Trans. Veh. Technol., vol. 70, no. 4, pp. 3661-3676, Apr. 2021.doi:[[[10.1109/TVT.2021.3068062]]]
  • 50 H. Li et al., "Sum secrecy rate maximization in NOMA-based cognitive satellite-terrestrial network," IEEE Wireless Commun. Lett., vol. 10, no. 10, pp. 2230-2234, Oct. 2021.doi:[[[10.1109/LWC.2021.3097583]]]
  • 51 V . Bankey et al., "Physical layer secrecy of NOMA-based hybrid satellite-terrestrial relay networks," in Proc. IEEE WCNC, 2020.doi:[[[10.1109/WCNC45663.2020.9120835]]]
  • 52 A. S. de Sena et al., "Rate-splitting multiple access and its interpaly with intelligent reflecting surfaces," IEEE Commun. Mag., vol. 60, no. 7, pp. 52-57, Jul. 2022.doi:[[[10.1109/MCOM.004.2100956]]]
  • 53 T. Li et al., "Max-min fair RIS-aided rate-splitting multiple access for multigroup multicast communcations," China Commun., vol. 20, no. 1, pp. 184-198, Jan. 2023.doi:[[[10.23919/JCC.2023.01.015]]]
  • 54 B. Zhuo et al., "RIS-IoE for date-dirven networks: New mentalities, trends and preliminary solutions," IEEE Internet J. Mag., vol. 6, no. 2, pp. 102-107, Jun. 2023.doi:[[[10.1109/IOTM.001.2200256]]]
  • 55 A. S. de Sena et al., "Dual-polarized massive MIMO-RSMA networks: Tacking imperfect SIC," IEEE Trans. Wireless Commun., vol. 22, no. 5, pp. 3194-3215, May 2023.doi:[[[10.1109/TWC.2022.3216507]]]
  • 56 S. K. Singh et al., "Ergodic capacity and placement optimization for RSMA-enabled UAV-assised communication," IEEE Syst. J., vol. 17, no. 2, pp. 2586-2589, Jun. 2023.doi:[[[10.1109/JSYST.2022.3220249]]]
  • 57 H. Pang et al., "Resource allocation for RSMA-based coordinated direct and relay transmission," IEEE Wireless Commun. Lett., vol. 12, no. 3, pp. 505-509, Mar. 2023.doi:[[[10.1109/LWC.2022.3232782]]]
  • 58 W. U. Khan et al., "Rate splitting multiple access for next generation cognitive radio enabled LEO satellite networks," IEEE Trans. Wireless Commun., vol. 22, no. 11, pp. 8423-8435, Nov. 2023.doi:[[[10.1109/TWC.2023.3263116]]]
  • 59 M. Can et al., "Outage probability analysis of rate-splitting multipleaccess-based hybrid satellite-terrestrial relay network with relay selection," IEEE Trans. Aeros. Elec. Syst., vol. 59, no. 5, pp. 6508-6517, Oct. 2023.doi:[[[10.1109/TAES.2023.3276343]]]
  • 60 H. Cui et al., "Energy-efficient RSMA for multigroup multicast and multibeam satellite communications," IEEE Wireless Commun. Lett., vol. 12, no. 5, pp. 838-842, May 2023.doi:[[[10.1109/LWC.2023.3245631]]]
  • 61 L. Yin et al., "Rate-splitting multiple access for satellite-terrestrial integrated networks: Benefits of coordination and cooperation," IEEE Trans. Wireless Commun., vol. 22, no. 1, pp. 317-332, Jan. 2023.doi:[[[10.1109/TWC.2022.3192980]]]
  • 62 Q. Zhang et al., "Deep unfolding for cooperative rate splitting multiple access in hybrid satellite terrestrial networks," China Commun., vol. 19, no. 7, pp. 100-109, Jul. 2022.doi:[[[10.23919/JCC.2022.07.009]]]
  • 63 J. Huang et al., "Deep reinforcement learning-based power allocation for rate-splitting multiple access in 6G LEO satellite communication system," IEEE Wireless Commun. Lett., vol. 11, no. 10, pp. 2185-2189 Oct. 2022.doi:[[[10.1109/LWC.2022.3196408]]]
  • 64 H. Kong et al., "Combined robust beamforming with uplink RSMA for multibeam satellite systems," IEEE Trans. Veh. Technol., vol. 71, no. 9, pp. 10167-10172, Sep. 2022.doi:[[[10.1109/TVT.2022.3181050]]]
  • 65 Z. Lin et al., "Supporting IoT with rate-splitting multiple access in satellite and aerial-integrated networks," IEEE Internet Things J., vol. 8, no. 14, pp. 11123-11134, Jul. 2021.doi:[[[10.1109/JIOT.2021.3051603]]]
  • 66 Z. Lin et al., "Secure and energy efficient transmission for RSMA-based cognitive satellite-terrestrial networks," IEEE Wireless Commun. Lett., vol. 10, no. 2, pp. 251-255, Feb. 2021.doi:[[[10.1109/LWC.2020.3026700]]]
  • 67 Y . Li et al., "Rate-splitting multiple access-enabled security analysis in cognitive satellite terrestrial networks," IEEE Trans. Veh. Technol., vol. 71, no. 11, pp. 11756-11771, Nov. 2022.doi:[[[10.1109/TVT.2022.3192042]]]
  • 68 I. S. Gradshteyn, I. M. Ryzhik, A. Jeffrey, and D. Zwillinger, Table of integrals, series and products, 7th ed. Amsterdam, Boston: Elsevier, 2007.custom:[[[http://fisica.ciens.ucv.ve/~svincenz/TISPISGIMR.pdf]]]
  • 69 A. Abdi et al., "A new simple model for land mobile satellite channels: First-and second-order statistics," IEEE Trans. Wireless Commun., vol. 2, no. 3, pp. 519-528, May 2003.doi:[[[10.1109/TWC.2003.811182]]]
  • 70 M. Abramowitz and I. A. Stegun, Handbook of Mathematical Functions With Formulas, Graphs, and Mathematical Tables, 9th ed. New York, NY , USA: Dover, 1972.custom:[[[https://personal.math.ubc.ca/~cbm/aands/abramowitz_and_stegun.pdf]]]
  • 71 K. Guo et al., "Physical layer security for multiuser satellite communication systems with threshold-based scheduling scheme," IEEE Trans. Veh. Technol., vol. 69, no. 5, pp. 5129-5141, May 2020.doi:[[[10.1109/TVT.2020.2979496]]]
  • 72 P. Patcharamaneepakorn et al., "Spectral, energy, and economic efficiency of 5G multicell massive MIMO systems with generalized spatial modulation," IEEE Trans. Veh. Technol., vol. 65, no. 12, pp. 9715-9731, Dec. 2016.doi:[[[10.1109/TVT.2016.2526628]]]

TABLE I

SYSTEM PARAMETERS.
Parameters Value
Satellite orbit GEO
Frequency band f=2 GHz
3 dB angle [TeX:] $$\vartheta_{3 \mathrm{~dB}}=0.8^{\circ}$$
Maximal beam gain [TeX:] $$\bar{G}_{\max }=48 \mathrm{~dB}$$
link bandwidth W = 15 MHz
Noise temperature [TeX:] $$300^{\circ} \mathrm{K}$$

TABLE II

CHANNEL PARAMETERS.
Shadowing [TeX:] $$m_{S R_p}$$ [TeX:] $$b_{S R_p}$$ [TeX:] $$\Omega_{S R_p}$$
Frequent heavy shadowing (FHS) 1 0.063 0.0007
Average shadowing (AS) 5 0.251 0.279
Infrequent light shadowing (ILS) 10 0.158 1.29
Description of the secrecy system model.
SOP versus different [TeX:] $$\bar{\gamma}$$ with M=3, L=3, [TeX:] $$\bar{\gamma}_E=-5 \mathrm{~dB} \text {, }$$ P=3 and [TeX:] $${\gamma}_0=-4 \mathrm{~dB}$$ different shadowing scenarios.
SOP versus different [TeX:] $$\bar{\gamma}$$ and different [TeX:] $$\gamma_0$$ with M=3, L=3, [TeX:] $$\bar{\gamma}_E=-5 \mathrm{~dB} \text {, }$$ and P=3 for FHS scenario.
SOP versus different [TeX:] $$\bar{\gamma}$$ and different P with M=3, L=3, [TeX:] $$\bar{\gamma}_E=-5 \mathrm{~dB} \text {, }$$ and [TeX:] $${\gamma}_0=-4 \mathrm{~dB}$$ for FHS scenario.
SOP versus different [TeX:] $$\bar{\gamma}$$ and different [TeX:] $$\bar{\gamma}_E$$ with M=3, L=10, P=3, and [TeX:] $${\gamma}_0=-4 \mathrm{~dB}$$ for FHS scenario.
SOP versus different [TeX:] $$\bar{\gamma}$$ and different power allocation factors with M=3, L=3, P=3, [TeX:] $$\bar{\gamma}_E=-5 \mathrm{~dB} \text {, }$$ and [TeX:] $${\gamma}_0=-4 \mathrm{~dB}$$ for FHS scenario.
SOP versus different [TeX:] $$\bar{\gamma}$$ and different [TeX:] $${\gamma}_0$$ with M=3, L=3, and P=3 for FHS and AS scenario.
SOP versus different [TeX:] $$\bar{\gamma}$$ and different selection schemes with M=3, L=3, [TeX:] $$\bar{\gamma}_E=-5 \mathrm{~dB} \text {, and } \gamma_0=-4 \mathrm{~dB}$$ for FHS scenario.
SEE versus different [TeX:] $$\bar{\gamma}$$ and two selection scheme with M=3, L=2, [TeX:] $$\bar{\gamma}_E=-5 \mathrm{~dB} \text {, and } \gamma_0=-4 \mathrm{~dB}$$ for ILS scenario.
SEE versus different [TeX:] $$\bar{\gamma}$$ and different shadowing scenarios with M=3, L=2, [TeX:] $$\bar{\gamma}_E=-5 \mathrm{~dB} \text {, and } \gamma_0=-4 \mathrm{~dB}$$.
SEE versus different [TeX:] $$\bar{\gamma}$$ and two multiple access cases with M=3, L=2, [TeX:] $$\bar{\gamma}_E=-5 \mathrm{~dB} \text {, and } \gamma_0=-4 \mathrm{~dB}$$ for FHS scenario.